|Publication number||US5999940 A|
|Application number||US 08/915,662|
|Publication date||Dec 7, 1999|
|Filing date||Aug 21, 1997|
|Priority date||May 28, 1997|
|Also published as||EP0883068A2, EP0883068A3|
|Publication number||08915662, 915662, US 5999940 A, US 5999940A, US-A-5999940, US5999940 A, US5999940A|
|Original Assignee||Home Information Services, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (9), Referenced by (212), Classifications (8), Legal Events (9)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application claims the benefit of U.S. Provisional Application No. 60/047,998, entitled "Agent-Based Server," filed on May 28, 1997 by Denis Ranger, incorporated herein by reference.
The present invention relates to data processing and, more particularly, to information discovery and visualization.
There is a vast amount of information in the world today that is available by computer. For example, on the World Wide Web alone there are millions of browsers and millions of web pages. In addition to the Internet, companies have set up local "intranets" for storing and accessing data for running their organizations. However, the sheer amount of available information is posing increasingly more difficult challenges to conventional approaches.
A major difficulty to overcome is that information relevant to a purpose of a user is often dispersed across the network at many sites. It is often time-consuming for a user to visit all these sites. One conventional approach is a search engine. A search engine is actually a set of programs accessible at a network site within a network, for example a local area network (LAN) at a company or the Internet and World Wide Web. One program, called a "robot" or "spider," pre-traverses a network in search of documents and builds large index files of keywords found in the documents.
A user of the search engine formulates a query comprising one or more keywords and submits the query to another program of the search engine. In response, the search engine inspects its own index files and displays a list of documents that match the search query, typically as hyperlinks. When a user activates one of the hyperlinks to see the information contained in the document, the user exits the site of the search engine and terminates the search process.
Search engines, however, have their drawbacks. For example, a search engine is oriented to discovering textual information only. In particular, they are not well-suited to indexing information contained in structured databases, e.g. relational databases. Moreover, mixing data from incompatible data sources is difficult in conventional search engines.
Often a user may wish to collect different kinds of information together. For example, a hospital administrative staff worker may need to search one database to find out what kind of health insurance a patient has, another database to find out which doctor is treating the patient, and a third database to find out which services have been performed. Often, the hospital administrative staff worker will be making the same kinds of time-consuming queries daily, but for different patients.
Another disadvantage with conventional search engines is that irrelevant information is aggregated with relevant information. For example, it is not uncommon for a search engine on the World Wide Web to locate hundreds of thousands of documents in response to a single query. Many of those documents are found because they coincidentally include the same keyword in the search query. Sifting through search results in the thousands, however, is a daunting task.
As another example, a personnel administrator might be interested an employee's choice of health plan, but an MIS administrator would be more interested in which computer the employee is using. Therefore, the user has to sort out which documents and databases are relevant and which are irrelevant for a particular goal.
By pre-traversing a network to index documents, a conventional search engine suffers from obsolescence of data in its search indexes. Documents are constantly being updated, but it may take months for the new information to filter down to search engines.
When a user activates a hyperlink on a page of search results, the user leaves the search site and terminates the search. Users who are browsing for more information must return back to the search site. Another effect of leaving the search site is that sponsors of the search site, e.g. paid advertisers, have minimal interaction with users of the search site.
There exists a need for a mechanism to collect relevant information located at a plurality of sites and stored in plurality of incompatible formats according to configurable search strategies. There is also a need for filtering out irrelevant information, avoiding obsolete information, and automatically classifying query results. Furthermore, a need exists for integrating browsing with searching so that a user does not have to leave a search site when looking for information.
These and other needs are met by the present invention, which dynamically gathers information from a diversity of data sources with agents, organizes the information in an configurable, information model, and visualizes the information according to a paradigm.
According to one aspect of the invention, a method of information discovery includes the step of accessing a description of a body of data, e.g. a class description of an object in an information model. In response to receiving an input, such as a browsing command or a name, from a user that identifies the body of data, information is gathered from a plurality of data sources based on the description and the input and structured according to the description. At least some of the body of data is output. By gathering information in response to user input, search strategies can be automated and obsolescence of the information can be reduced. By structuring information according to a description, relevant information can be collected together.
According to another aspect of the invention, a method of visualizing information comprises the step of accessing a description of a body of data and a plurality of descriptions of visual representations for the body of data. Information is gathered for the body of data from a plurality of data sources based on the description of the body of data. At least some of the body of data is output based one of the descriptions of visual representations for body of the data, indicated by input received from a user. By outputting to the user some of the data according to a selected visual representation, irrelevant information can be filtered out.
According to other aspects of the invention, sequences of instructions are embodied in a computer readable medium, such as a computer memory, disk, or carrier wave, for causing a computer to discover and visualize information.
Additional objects, advantages, and novel features of the present invention will be set forth in part in the detailed description which follows, and in part will be come apparent upon examination or may be learned by practice of the invention. The objects and advantages of the invention may be realized and obtained by means of the instrumentalities and combinations particularly pointed out in the appended claims.
The present invention is illustrated by way of example, and not by limitation, in the figures of the accompanying drawings, wherein elements having the same reference numeral designations represent like elements throughout and wherein:
FIG. 1 is a high-level block diagram of a computer system with which the present invention can be implemented.
FIG. 2 is a diagram of a network in which the present invention can be implemented.
FIG. 3 is a diagram of data structures employed by an embodiment of the invention.
FIG. 4 is a flowchart illustrating the operation of an embodiment.
FIG. 5 is a flowchart illustrating the operation of resolving an instance with agents.
FIG. 6 is a flowchart illustrating the operation of invoking agents.
FIG. 7 is a flowchart illustrating the operation of automatic content analysis.
FIG. 8 depicts screen displays of an automatic content analysis according to one embodiment.
A method and apparatus for information discovery and visualization are described. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.
FIG. 1 is a block diagram which illustrates a computer system 100 upon which an embodiment of the invention may be implemented. Computer system 100 includes a bus 102 or other communication mechanism for communicating information, and a processor 104 coupled with bus 102 for processing information. Computer system 100 also includes a main memory 106, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 102 for storing information and instructions to be executed by processor 104. Main memory 106 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 104. Computer system 100 further includes a read only memory (ROM) 108 or other static storage device coupled to bus 102 for storing static information and instructions for processor 104. A storage device 110, such as a magnetic disk or optical disk, is provided and coupled to bus 102 for storing information and instructions.
Computer system 100 may be coupled via bus 102 to a display 112, such as a cathode ray tube (CRT), for displaying information to a computer user. An input device 114, including alphanumeric and other keys, is coupled to bus 102 for communicating information and command selections to processor 104. Another type of user input device is cursor control 116, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 104 and for controlling cursor movement on display 112. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), which allows the device to specify positions in a plane.
The invention is related to the use of computer system 100 to discover and visualize information according to a configurable information model. According to one embodiment of the invention, information discovery and visualization is provided by computer system 100 in response to processor 104 executing sequences of instructions contained in main memory 106. Such instructions may be read into main memory 106 from another computer-readable medium, such as storage device 110. However, the computer-readable medium is not limited to devices such as storage device 110. For example, the computer-readable medium may include a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, an EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave embodied in an electrical, electromagnetic, infrared, or optical signal, or any other medium from which a computer can read. Execution of the sequences of instructions contained in main memory 106 causes processor 104 to perform the process steps previously described. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
Computer system 100 also includes a communication interface 118 coupled to bus 102. Communication interface 108 provides a two-way data communication coupling to a network link 120 that is connected to a local network 122. For example, communication interface 118 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 118 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 118 sends and receives electrical, electromagnetic or optical signals which carry digital data streams representing various types of information.
Network link 120 typically provides data communication through one or more networks to other data devices. For example, network link 120 may provide a connection through local network 122 to a host computer 124 or to data equipment operated by an Internet Service Provider (ISP) 126. ISP 126 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the "Internet" 128. Local network 122 and Internet 128 both use electrical, electromagnetic or optical signals which carry digital data streams. The signals through the various networks and the signals on network link 120 and through communication interface 118, which carry the digital data to and from computer system 100, are exemplary forms of carrier waves transporting the information.
Computer system 100 can send messages and receive data, including program code, through the network(s), network link 120 and communication interface 118. In the Internet example, a server 130 might transmit a requested code for an application program through Internet 128, ISP 126, local network 122 and communication interface 118. In accordance with the invention, one such downloaded application provides for information discovery and visualization as described herein.
The received code may be executed by processor 104 as it is received, and/or stored in storage device 110, or other non-volatile storage for later execution. In this manner, computer system 100 may obtain application code in the form of a carrier wave.
Referring to FIG. 2, depicted is a network 200 within which the present invention may be implemented. A web server 220 according to one embodiment of the present invention gathers information dynamically from one or more data sources, which may be located at different servers and have incompatible formats, structures the information into an object-oriented, information model, and outputs the information for the user according to an associated visual representation. The information model and the visual representation are defined by human operators according to their own needs, purposes, and preferences as part of the configuration of the server. Multiple information models and visual representations may be defined for any server.
A user may access the web server 220 by executing a web browser at client 210. Web browsers are well-known in the art, and are readily available from such corporations as Netscape™ Communications Corp. and Microsoft™ Corp. In order to access the web server 220, the user at client browser 210 activates a hyperlink having a URL (Uniform Resource Locator) of the following form:
TABLE 1______________________________________http://www.server.com/query.pl?Class=Seed& View=Paradigm______________________________________
In the exemplary URL, the network address of the web server 220 is specified as "www.server.com" and the portion of the URL after the question mark (?) hold user specified parameters. The Class and Seed parameters, as explained in more detail hereinafter, indicate an object about which a user intends to discover information. The object is visualized according a paradigm specified by the Paradigm parameter, also explained in more detail hereinafter.
When the hyperlink is activated, the web server 220 receives a request to initiate an information discovery session, specified by parameters embedded in the URL. In response, the web server 220 gathers information from one or more data sources. The data sources can have incompatible formats, e.g. web page, relational database, spreadsheet, text file, etc. The data sources can be stored at a plurality of sites, for example, locally with respect to the web server 220, such as a hard disk at local storage 222, or externally at another site in the network, e.g. at mainframe 230. In fact, the data source can even be another, remote information discovery web server 240.
Each web server implementation of the present invention includes a framework for information discovery, modeling, and visualization. Referring to FIG. 3, depicted is a data structure of a general-purpose information modeling and visualization framework 300 for defining and configuring the information models and visual representations stored at a server. Many-to-one relationships between data fields in the data structure are indicated by an interconnecting line with an inverted "V" on the many side. For example, instances 315 may have many attributes 311. Accordingly, there is an inverted "V" on the "many" side of the "Instance" field 311-1 and no inverted "V" on the "one" side of the "Instance" field 315-1.
Framework 300 is a way of generically organizing information about specific information models. Accordingly, data structures for framework 300 define a set of data types, describing how classes of the information model are defined, how objects in the information model are instantiated, and how objects are displayed.
According to one embodiment, the data structures for framework 300 are implemented within a relational database. Each data type in the framework 300 corresponds to a table in the relational database, each instance of a data type is stored as a row or "entry" in a table corresponding to the type, and the fields of each data type correspond to columns in the corresponding table. Persons of skill in the art would readily recognize that the framework 300 may be implemented in a variety of ways other than with a relational database, for example, by a collection of persistent objects defined with an object-oriented language such as C++, Smalltalk, and Java, or files of records or structures of a procedural language such as C, Pascal, Ada, BASIC, FORTRAN, COBOL, PL/I, and the like.
Closely related data types defined by framework 300 are grouped in three related layers: a data layer 310, a conceptual layer 320, and a visualization layer 330. The conceptual layer 320 acts as an intermediary between the data layer 310 and the visualization layer 330 and comprises data types that describe how information is organized within a defined information model.
The main data type in the conceptual layer 320 is the "Classes" data type 327. A object of the "Classes" data type 327 includes a "Class" attribute 327-1, which is a unique identifier, e.g. a serial number or a memory address, for pointing to or referencing a class object. A "Classes" 327 object also includes a "Name" field 327-2, which is another unique identifier but in a format convenient for human use, e.g. a string containing the name of the class, e.g. "person" or "employee." The "Description" field 327-3 is a string for storing an annotation for an operator maintaining and debugging the configuration of the server.
The "Life Span" field 327-4 specifies at most how long an instance of the class will last. There are three life spans: permanent, mortal, and instant. A permanent instance of a class will remain in the database until explicitly and manually removed. A mortal instance will be removed automatically after it expires. An instant instance is only available for the query that found it. An instance may be removed from the data layer 310 before expiration of its life span for space management reasons. For example, if the database reaches an overflow condition or fills up, a number of instances, e.g. the least recently used instances, would be removed to create space.
The "Remote Server" field 327-5, if non-empty, holds a URL of a server that defines this class. In this manner, a local server can link to another, remote server for defining, gathering information, and caching instances of the remote class. For example, a bank server that models bank-related information may model car loans. A "car loan" object may have an attribute that is a "car" object, describing the car for which the loan was made. The "car" object itself, however, may be defined at another server. The other server or "remote server" is accordingly responsible for gathering and structuring information about cars. Thus, the remote server feature allows a local server to link to a remote server for modeling, while keeping the area of expertise of the separate servers as uncoupled as possible. As explained in more detail hereinafter, remote class instances may be visualized with a hyperlink.
Objects of a class may have any number of attributes, which are defined by the "Attribute Definition" data type 321. For example, a person may have a name, e.g. "Denis." Accordingly, the name attribute for the person class would have an entry in the "Attribute Definition" table 321. In this example, the "Attribute" field 321-1 contains a unique identifier for the attribute. The identifier for the class that the attribute belongs to is contained in the "Class" field 321-4. The "Attribute" table 321 also includes a field for a human-readable "Name" 321-3. Each attribute may have a default class 321-5 and a default value 321-6 to be used when information about attribute has not yet been gathered.
Certain attributes may be a "seed" if the "Seed" field 321-6, containing a boolean or yes/no value, is true or yes. A seed attribute is a value that identifies an object, allowing the server to find and gather information about the object. For example, a person's name or social security number (SSN) may be a seed attribute. A class may specify one or a plurality of seed attributes.
Entries in the "Mutations" 323 table specify patterns by which the server recognizes that an instance of one class should be considered to be an instance of an immediate subclass. For example, a "person" object having a "gender" attribute may change to an object of the "male" class (indicated by the "Class" field 323-1) when the "gender" attribute (indicated by "Attribute" field 323-2) attains a value equal (indicated in "Conditions" field 323-3) to "male" (indicated by "Value" field 323-4). Other values of "Conditions" field 232-3 include "greater than or equal to" (>=) and "less than or equal to" (<=).
The "Is A" table 325 is used to support simple and multiple inheritance, which allows the configurable information model to be object-oriented. An operator may wish to declare that a "employee" class inherits from, i.e. is a subclass of, a "person" class. Accordingly, an entry in the table for the "Is A" data type 325 would have a "Superclass" field 325-1 that identifies the "person" class and a "Subclass" field 325-2 that identifies the "employee" class. A subclass inherits the attributes of its superclass and may add additional attributes. For example, an "person" object may have a "name" attribute. In this case, an "employee" object also has a name attribute, but may add an attribute for an SSN.
The "Level" field 325-3 indicates a transitivity level of superclass/subclass link. Level 1 indicates a direct relationship (parent/child). A level 2 link indicates a relationship through a level 1 link, e.g. a grandparent/grandchild relationship. All superclasses, direct and indirect, are stored as entries for a given subclass. Mutators are used to specialize an object, that is change the class of an object into a subclass.
Each class has a list of agents, located in separate entries in the "Agents" table 328. Entries in the "Agents" table 328 include an "ID" field 328-1 for providing a unique, machine-readable identifier, e.g. a serial number or an address in virtual memory. A human-readable description of the agent, e.g. a string, is stored in the "Description" field 328-4 for aiding in the development and maintenance of agents by administrators.
An agent is program, written in Perl for example, or any other set of interpreted or machine executable instructions that is responsible for querying an external data source (e.g. a database, a web-site) and storing the results for an instance of the class, specified in the "Class" field 328-2. As explained in more detail hereinafter, agents are invoked on demand, for example automatically during the process of "resolving" an instance based on its class and seed or triggered upon a user request (e.g., pressing a "reload" button on a browser).
The "Sequence" field 328-4 contains a number that defines a sequential order of invocation of the agents for a class. For example, agents with a lower sequence number are invoked before agents with a higher sequence number. Generally, agents are ordered using the transitivity level, specified in the "Level" field 325-3. Agents defined in the current class are fired first, followed by those of the parents (level 1), then those of the grandparents (level 2), and so on. The sequence number is used to fine-tune departures from this default ordering.
The "Type" field 328-5 specifies one of two types of agents: attribute and content. An attribute agent is responsible for gathering information about an object, e.g. getting the author of a document, the size of the document, etc. Attribute agents are normally invoked when resolving an instance, which takes place the first time the value of an attribute is requested.
Content agents, on the other hand, are responsible for gathering the content of an object, for example, the files in a directory, graphics and paragraphs from a web page, names in a phone book, etc. A class or superclass of all the content objects to be found by an agent is specified in the "Content Class" field 328-13. Content agents are invoked whenever the content of an object is first accessed, usually when producing a visualization of a space of the object, as described in more detail hereinafter.
Efficiency in the implementation of the present invention may be enhanced by specializing agents for specific data sources. Accordingly, the "Specialty" field 328-6 specifies the nature of a data source the agent queries. For example, the "Specialty" field 328-6 may indicate "ODBC" for relational databases. In this case, the specialized database agent is programmed to submit an SQL query to a relational database based on parameters specified in the "Agent Parameters" table 329 and convert the SQL query results into a proper format for attributes of an object.
Other specialties include "Web" for web pages, "CORBA" for object request brokers, and "Telnet" for information available on-line through the "telnet" interface, e.g. negotiating an interactive session with a remote system over a (virtual) terminal. The actual name of the specialized data source is stored in the "Origin" field 328-12. The "Perl" specialty is a generic mechanism for retrieving information from other data source formats, by executing Perl instructions.
The "Time Out" field 328-7 indicates how long an agent should wait before deciding that a data source is unavailable. This feature is useful in handling network outages.
Agents of a superclass are normally invoked for its subclasses, unless the value in the "Local" field 328-8 specifies otherwise. A local agent is not invoked by subclasses or any other class. Local agents are useful in conjunction with mutating objects when an agent of the source class for the object no longer makes sense for destination class of the object. For example, a "file" object may include an agent for determining a type (e.g. graphic, text) of a file. If the type of the file is a graphic, then a mutation (defined in "Mutations" table 323) may cause the class of the file object to become a "graphic" object. However, a graphic object does not need an agent to determine its file type, because its file type, graphic, must be known. By declaring the agent to determine the file type of a file object to be a local agent, this agent does not need to be invoked for objects of subclasses that already know their types.
For debugging and diagnostic purposes, an administrator may temporarily disable an agent from firing by placing a "yes" value in the "Disabled" field 328-9. The "Authoritative" field 328-10 contains a "yes" or "no" value identifying how to respond when an agent is not able to find requested information. If an authoritative agent is not able to find the requested information, then that condition indicates that no other agent would be able to find the information. This feature reduces the number of unnecessary agent invocations.
The "Mutator" field 328-11 specifies whether an agent can be used by a parent class to test for mutation to the class specified in the "Class" field 328-2. For example, an object of a "Company" class may use a "Get Ticker Tape" agent of a "Public Company" subclass if the "Mutator" field 328-11 is "yes." If the "Get Ticker Tape" agent returns a success code, then the "Company" object would mutate to be a "Public Company" object.
The "Agent" field 328-14 contains instructions, or alternatively a name of a program comprising instructions, to be executed when invoking the agent. The instructions may comprise interpreted instructions, e.g. a Perl script or shell script, SQL statements, machine executable instructions, e.g. a compiled C program, or both.
When an agent is invoked, it is passed parameters specified in entries of "Agent Parameters" table 329. The "Agent" field 329-1 of an entry contains an identifier of the agent to which an agent parameter belongs. The "Key" field 329-2, the "Value" field 329-3, the "Type" field 329-4 are specific to each agent specialty, but generally denote the name, value, and data type, respectively, of each agent parameter. In an example of a web agent, the "Key" field 329-2 contains the name of a variable to match, the "Type" field 329-4 contains where to look (e.g. text, HTML, or links), and the "Value" field 329-3 contains a regular expression of a recognition pattern. Multiple agent parameters for a single agent are supported by multiple entries in the "Agent Parameter" table 329 with the same value in the "Agent" field 329-1.
The data layer 310 acts as the server's memory. Any results of invoking a class agent is stored in the data layer 310. Although the main purpose of the data layer 310 is to reduce network traffic and dependencies on the reliability of external data sources, the data layer 310 may also be used to store users' annotations and other relevant manual additions to the data discovered by class agents.
An instance is a body of data that is a concrete example of a description provided by a class. In this framework 300, all instances may contain any number of other instances of any class. Each instance has a corresponding entry in the "Instances" table 315. The "Instance" field 315-1 is a unique identifier, e.g. a serial number or memory address, for the instance. The class of the instance is specified by an identifier in the "Class" field 315-2. If an object is an instance of a mortal class, the "Expiration" field 315-3 contains an expiration date directed from the life span of the class and the creation time of the instance.
Cached instances remember the state of their agent resolution. An instance may be cached when only some of its agents have been invoked, for example, when a user directs the web server to visualize another instance, suspending the invocation of class agents for the instance. Accordingly, returning back to the instance resumes invoking the agents at the state which the agent invocation was suspended. Therefore, the "Agent Seed" field 315-4 contains the seed that agents were invoked with, and the "Agent State" 315-5 contains information indication which agents were invoked, e.g. agent numbers (cf. "ID" field 328-1).
Each instance contains a value for each attribute defined in its class and superclass definition. Specifically, entries for attribute values are stored in the "Attributes" table 311. The "Instance" field 321-1 of an entry identifies which instance contains the value in the "Seed" field 311-3 for an attribute specified in the "Attribute" field 311-2.
Each instance may contain other instances of any class by storing corresponding entries in the "Contents" table 313. The "Contents" table 313 includes an "Instance" field 313-1 for identifying the containing instance. The "Contents" table 313 also includes a class identifier in the "Class" field 313-2, and a value identifying the instance in the 313-3. In general, the combination of a class and a seed is sufficient to identify and resolve any particular instance in the information model.
The visualization layer 330 contains knowledge describing how to visually represent an instance of class. The visual representation is language independent, i.e., it may be Hypertext Markup Language (HTML), Virtual Reality Modeling Language (VRML), or plain text.
A "paradigm" is a named group of visualizations of classes in a way that makes sense in a given context. For example, an "Internet" paradigm may provide a view of the world where IP (internet protocol) addresses, networks, and ISPs are important. As another example, a "Corporate" paradigm may present a coherent view of departments, employees, and so forth.
Each paradigm has an entry in the "Paradigms" table 337. The "Paradigm" field 337-1 holds a unique identifier, e.g. a serial number or a memory address, for each paradigm. The "Name" field 337-2 and the "Description" field 337-3 are human-readable fields for identifying and describing, respectively, each paradigm to aid in configuration and debugging. The "Links" field 337-4 specifies a template for expanding links, for browsing, in a paradigm.
The "Generic Container" field 337-5 specifies a space model for visualizing an anonymous collection of objects, which occurs when a query returns more than one result. For example, a user may query for a person named "Bob," and the web server may, in response, find more than one "Bob" in its data sources. Each instance of "Bob" is placed in a generic container and visualized according to the space model specified in the "Generic Container" field 337-5.
The "Authentication" field 337-6 specifies an authentication realm that identifies a group of user who have permission to use a resource, e.g. a paradigm. For example, a value of "managers" in the "Authentication" field 337-6 may signify that only users of a predefined "managers" group who enter a correct user name and password may use an associated paradigm. Authentication realms and their users are defined at the web server. In the example, a web server for a book store may provide two paradigms. A first "Customer" paradigm is for (potential) customer, does not require authentication, and allows any user to investigate which books are in stock. A second "Employee" paradigm, on the other hand, requires authentication, specifying the "managers" realm, because it displays more sensitive information, such a book store's employee's home telephone number, for managers.
Instances of a class may be represented differently in different paradigms and need not have a representation in every paradigm. However, there is only one representation of a class per paradigm. Accordingly, the "Class Views" data type 333 provides a mechanism to associate a class with a paradigm. Specifically, the "Class" field 333-2 and the "Paradigm" field 333-3 are used to identify a class-paradigm association. The visualization of the class-paradigm combination is controlled by a model, specified by the "Model" field 333-4 in conjunction with model mappings, which reference the class view according to the identifier, e.g. a serial number, stored in the "View" field 333-1. As explained in more detail hereinafter, by separating the visual representation into a model and model mappings, a visualization model for one class may be reused for another class, because the class-specific information, e.g. attribute names, are encapsulated in the model mappings.
A model is a generic, parameterized representation, used in conjunction with an underlying instance of the associated class. Model entries stored in the "Models" table 339, which includes a "Model" field 339-1 to identify each model and a "Name" field 339-2 and a "Description" field 339-4 for providing a human-readable identifier and description, respectively.
A "Template" field 339-5 specifies executable instructions or input for executable instructions to produce a formatted representation based on "model attributes" as parameters. According to one embodiment, the template is implemented as a Perl script, however, persons of skill in the art would readily recognize that the template may be implemented in other computer languages, whether interpreted or compiled. As explained in more detail hereinafter, templates include slots for expanding variables according to cached attribute values.
The "Specialty" field 339-6 indicates what kind of visualization is performed by a model, for example, hypertext and virtual reality modeling. If the "Specialty" field 339-6 indicate virtual reality modeling, then the "Extent" field 339-7 indicates an x-y-z dimension of an object or space in the three dimensional visualization model.
The "Type" field 339-3 indicates whether the model is a "space" or an "object." If a space model represents a virtual location in the paradigm, for example, a place where users can bookmark with their browser for later return. A space is used to enclose items that are contained in the underlying instance that also can be represented in the associated paradigm. Some examples of a space include a 3D room (in a virtual reality modeling specialty) and a web page (in a hypertext specialty) Both the attributes and the contents of the underlying instance (ultimately stored at "Attributes" table 311 and "Contents" table 313, respectively) are used to render a space in a visualization.
An object model type indicates an atomic representation that only uses named attributes of the underlying instance. In other words, an object model type does not use the contents associated with the underlying instance. A visualization of an object model type always appears in a space.
A model interfaces with its underlying instance through model attributes and model mappings. Model attributes, stored in "Model Attributes" table 335, include a "Model" field 335-1 for identifying the related model, a "Name" field 335-2 for identifying the model attribute, and a "Default Value" 335-3 for specifying a value for a model attribute when the underlying instance does not.
Model attributes are mapped to class attributes through the "Model Mappings" 331 data type. Since model attributes have a default value 335-3, it is not necessary to provide a complete mapping. An entry in the "Model Mappings" 331 table has a "view" field 331-1 to indicate which class view the model mapping is associated with. The "Name" field 331-2 contains the name of the model attribute that is being mapped in the entry.
The "Expansion" field 331-3 specifies a template for visualizing attributes. The template in the "Expansion" field 331-3 is expanded in the same manner as templates in the "Template" field 339-5 of the "Models" table 339 for the current model. For example, the expansion template may include slot for variable expansion as described in more detail hereinafter. Thus, the "Expansion" field 331-3 may be used for pre-expanding model attributes, e.g., for concatenating a class attribute with another value such as a constant string or another class attribute. The "Expansion" field 331-3 may also be used to specify an instance attribute name mapped to the model attribute.
One aspect of invention relates to a mechanism for providing multiple visualizations of the same object based on a user selected paradigm. As explained hereinbefore, a paradigm is a group of related visualizations of classes. Different paradigms can provide different visualizations for the same object.
For example, an "employee" object may be visualized in association with information about salary, health benefits, and a retirement plan in a "Personnel" paradigm, but the same employee object may be visualized in association with information about the employee's e-mail address, computer model, and word processor type in an "MIS" paradigm. Thus, human resources administrators and MIS administrators would only see the information that is relevant for their tasks, because they interact with the system through different paradigms, designed for their tasks.
A user initiates a session with the server by specifying the name of a class, a seed, and the name of a paradigm. For example, a personnel director may wish to look up information about an employee having an SSN of 999-99-9999. In this case, the personnel director would input a class name "Employee," a seed "999-99-9999," and a paradigm name "Personnel." According to one embodiment, a browser that the personnel director is using may display a form collecting that information and submit to a server (e.g. at www.server.com) a query having a URL similar to:
TABLE 2______________________________________http://www.server.com/query.pl?Employee=999-99-9999& View=Personnel______________________________________
Referring to the flowchart of FIG. 4, in step 400 the server receives a query containing a name of a class (e.g. "Employee"), a seed for the class (e.g. "999-99-9999), and a name for a paradigm (e.g. "Personnel").
At step 402 the server determines a class view based on the class name and the paradigm name that have been input. In particular, the server scans the "Classes" table 327 to find an entry with the input class name (e.g. "Employee") in the "Name" field 327-2 to determine the class identifier in the "Class" field 327-1. Likewise, the server scans the "Paradigms, table 337 to find an entry with the input paradigm name (e.g. "Personnel") in the "Name" field 337-2 to determine the paradigm identifier in the "Paradigm" field 337-1. Thereupon the "Class Views" table 333 is scanned for an entry of a class view in which the "Class" field 333-2 contains the class identifier and the "Paradigm" field 333-3 contains the paradigm identifier.
The entry for the identified class view contains an identifier for a visualization model in the "Model" field 333-4. This identifier is used to fetch an entry from the "Models" table 339 (step 404), in which the "Type" field 339-3 is inspected to see if the model is a space. If the model is indeed a space, then one or more underlying instances for the model are resolved (step 406) from the input class name and the input seed, as described in more detail hereinafter.
If instance resolution does not result in the instantiation of any instance, i.e. no results, then a message indicating this situation, e.g. "not found" is output to the user (step 412). If instance resolution results in the instantiation of a plurality of instances, for example, when the seed value is not unique, then the results are placed in a generic container (step 414). In this situation, the model specified by a model identifier in the "Generic Container" field 337-5 of the paradigm (step 414) is used for visualization in place of the model of an individual instance (step 416).
In step 406, when instance resolution results in one object, the model attributes are mapped to attributes of the class of the underlying instance via "Model Mappings" table 331 to determine the values of the model attributes. In particular, the model identifier, originally determined from the "Model" field 333-4 of the class view entry in the "Class Views" table 333 is used to fetch entries in the "Model Attributes" table 335. The name of each model attribute, derived from the "Name" field 335-2, and a class view identifier from the "View" field 333-1 is used to fetch a model mapping entry in the "Model Mappings" table 331. If no such entry is found in the "Model Mappings" table 331, then the value in the "Default Value" field 335-3 is used.
On the other hand, if there is an entry in the "Model Mappings" table 331 for the model attribute and the class view, then the string expansion specified in the "Expansion" field 331-5 is performed. More specifically, the expansion generally results in a string containing the name of an instance attribute. The instance attribute name is used for fetching the attribute value of the instance from the "Attributes" table 311 in the data layer 310, in conjunction with the instance identifier of the underlying instance.
If the result of the expansion includes an object having a spatial visualization, then the value is expanded as a link by means of the "Links" field 339-4 of the entry for the current paradigm in the "Paradigms" table 339. In particular, the URL of the resulting link is of the form specified in TABLE 1.
Determining the class of the attribute value involves examining the "Type" field 337-3 for the model of the value's class within the current paradigm in the "Class Views" 333 table. If the attribute value is an unresolved instance or a scalar, then the value in the "Seed" field 311-3 is used. Instances of remote classes, defined and stored at another server, are visualized as a link with a URL of the form shown in TABLE 1 specifying the network address of the remote server, stored in the "Remote Server" field 327-5. Activating that link allows the object stored at the remote server to be visualized.
In step 410, the underlying instance is visualized. Since the underlying instance has a space visualization, the server will iterate through the contents of the instance (i.e., by fetching entries from the "Contents" table 313) and collect any item belonging to a class that has an object visualization (cf. "Type" field 339-3) in the current paradigm. When the number of content items exceed a predefined threshold, hit analysis is performed of the contents for automatically classifying the contents according to various criteria and categories, as explained in more detail hereinafter.
Content items are handled by recursively mapping model attributes for the content items and expanding corresponding visualization templates, in the "Template" field of the model for the class of the content item for the current paradigm. The expanded templates are concatenated to a special "Contents" parameter of the space model.
When all the values of the model attributes and contents have been determined, the template for the model in the "Template" field 339-5 is expanded and sent to the client browser for rendering. A visualization template may specify, for example, hypertext markup (e.g. in HTML) or 3D markup (e.g. in VRML).
Visualization templates may include slots for variable expansion, for example in one embodiment, of the form "$x", "%x", and "@x", where "x" is a name of a variable. If there is not an attribute for the underlying instance with that same name, i.e. "x" in this example, or if the attribute with that name does not have a value, then the default value of the model attribute, from "Default Value" field 335-3 is used as a current value. On the other hand, if there is an attribute with the same name, i.e. "x" in this example, then a current value for the expansion is the value of the attribute with the same name.
If there is a model mapping with the same name, specified in the "Name" field 331-2 of the "Model Mappings" table 331 for the current view ("View" field 331-1), then the template in the "Expansion" field 331-3 is expanded recursively, using the current value. A "%x" slot is replaced by the current value as is. A "$x" expansion slot is replaced by the current value using the HTML character set encoding and models of a spatial value are expanded as a link in the current paradigm showing the current value. A "@x" expansion slot is replaced by the current value using a restricted character set encoding for URLs.
When an attribute is expanded as a link, the user may activate the link as a browsing command, causing the instance associated with the attribute to be visualized by re-executing steps 402 through 408. Activating links to a remote server cause the remote server to perform steps 402 through 408 for the remote object. In this manner, it is possible for the user to stay in information discovery mode, or search mode, throughout browsing, because accessing each link yields new visualizations of new objects by the server. Thus, the user never really leaves the web site of the server and continues to view the visualizations during the browsing process.
As a result, operators of an embodiment of the present invention that is configured to be a search engine on the World Wide Web can defray costs by more effectively presenting advertising material during the entire session with the user. In contrast, conventional search engines merely present a list of hyperlinks as their results, and activating one of the hyperlinks takes the user out of the search site terminating the information discovery session.
In the example, if instead the employee object was viewed in an "MIS" paradigm, then a different set of models for the employee object and attributes is determined through the "Class Views" table 333. By the class view mechanism, the same object can be visualized in different ways depending the paradigm being employed. Thus, paradigms may be tailored for outputting relevant information of an object for specific purposes, while not outputting irrelevant information (e.g., an employee's salary for an MIS director). Some paradigms may require user authentication (e.g. password protection) for implementing security and controlling access to information.
In addition, the use of paradigms to specify models with expandable templates allows a "virtual web" within a configurable information model to be presented to a user in various kinds of visualizations. For example, a space may be visualized in one paradigm as a standard web page, using templates written with hypertext markup, e.g. in HTML, HTML+, HTML 3.0, etc. As another example, the same space, but through another paradigm, may be visualized as three dimensional worlds, using templates written with virtual reality modeling, e.g. in VRML. In a 3D world, companies may be shown as buildings and employees as "avatars." In fact, the user can be enabled to switch from one paradigm to another, allowing to the user to decide and choose which representation is more effective for exploration.
Another aspect of the invention relates to dynamic data integration from a variety of data sources, for example, databases, files, documents, and web servers located at various site on a network. The data collection is performed on demand by users as their needs arise. The retrieved information may be cached in the data layer 310 for a period of time according to the server's configuration.
In one embodiment of the invention, dynamic data collection and integration are performed during resolution of an instance by invoking one or more agents. These agents, which comprise executable instructions, encapsulate knowledge about a particular data source, e.g. formatting information, relevant to a particular kind of object stored at the server. For example, an agent invoked for an instance of an "employee" class may query a relational database located at a company's headquarters. As another example, an agent responsible for collecting and integration about an instance of an "author" class may check a web-server for email addresses to discover a living author's email address. Other examples of data sources include web pages, search engines, text files, operating system files, SEC filings and reports, and the like.
Referring to the flowchart in FIG. 5, instance resolution uses a class and a seed as parameters (step 500). The class parameter is an identifier which can be used for selecting a single entry from the "Classes" table 327, which describes a body of data, i.e. an instance of the class, having attributes and contents. A seed is a value for an attribute of the object that is used for gathering information about the object. For example, a good seed for an "employee" object is an employee number, such as a social security number, because it uniquely identifies the employee and is a commonly used index in many authoritative databases.
In step 502, the data layer, which stores instances of classes, is checked to see if an instance that is a member of the class or subclass that has an attribute marked `seed` (e.g. in "Seed" field 321-6) with the value of the seed parameter. If such an instance is found, the instance identifier (stored in the "Instance" field 315-1) is returned in step 512. In addition, an identifier of the actual class of the instance (in the "Class" field 315-2) is also returned, because an instance with that seed value may be a member of a subclass, specified in the "Is A" table 325. For example, the server may be configured to discover information about "employee" objects. The corresponding "employee" class may have two subclasses, "exempt" and "nonexempt," for payroll purposes. When an "employee" instance is resolved, the actual class of the instance is one of the two subclass, "exempt" or "nonexempt."
On the other hand, if such an instance is not cached in the data layer 310, then the instance is instantiated in step 504 with attributes initialized from the seed parameter and the default values in the attribute description, e.g. in the 321-5 field. Instantiation results in the creation of a new entry in the "Instances" table 315 with a unique instance identifier being stored in the "Instance" field 315-1. In addition, the "Agent Seed" field 315-5 is initialized to the seed parameter and the "Agent State" field 315-4 is cleared.
In step 506, the agents to be invoked for gathering information for the new instance are determined. These agents may be agents specified for the class identified by the class parameter ("class agents") and non-local agents of superclasses of the class ("non-local superclass agents"). In one embodiment, agents are listed in respective entries of the "Agents" table 328. Class agents are determined from entries in which the class identifier in the "Class" field 328-2 matches the class parameter received in step 500. Non-local superclass agents are determined from entries in which the "Local" field 328-8 is false and the class identifier in the "Class" field 328-2 matches the class identifier specified in the "Superclass" field 325-1 of the "Is A" table 325 wherein the corresponding "Subclass" field 325-2 contains the class identifier matching the input class parameter.
As described in more detail hereinafter, the agents that have been determined to be invoked in step 506 are sorted by their level transitivity in the "Level" field 325-3 and by sequence number in the "Sequence" field 328-3 and successively invoked using the seed value (step 508). If successful, the instance is cached in the data layer 310 (step 510), setting the "Expiration" field 315-3, as appropriate. For example, the "Expiration" field 315-3 may contain the termination date of a mortal object (cf. the "Life Span" field 327-4). When a mortal object has expired, it is removed from the data layer 310. Finally, the instance identifier and the actual class, possibly changed due to a mutation, of the instance is returned in step 512.
Since agents are invoked when an instance is resolved, information that is potentially more up-to-date can be retrieved than through conventional search engines. Conventional search engines pre-traverse the web to build their index files, which may become out of date for months until the search index is re-updated. With the present invention, however, the "Life Span" attribute controls how long any information object is cached, reducing the obsolescence of information stored at the server to individually acceptable levels, e.g. caching for only a month.
Referring to FIG. 6, agents are invoked successively in sequence based on the value in the "Level" field 325-3 of the "Is A" table 325 and the "Sequence" field 328-3 of the "Agents" table 328. In one embodiment, the agent with the lowest sequence number is invoked first (step 500), but persons of skill in the art would readily recognize that other orders, e.g. the highest sequence number first, may be implemented. The purpose of ordering agents according to a sequence number, assigned by a human designer, is to allow some agents to rely on values discovered by other agents. When an agent is invoked, it is passed an instance identifier for accessing and modifying attributes of the instance being resolved and the input seed value.
For example, if the instance is a member of a "employee" class and the seed value is an employee number, the agent is passed an identifier of the instance and the employee number. The agent may use the employee number to query an authoritative database (cf. the "Authoritative" field 328-10), parse the result to determine some values of attributes (such as length of employment), and initialize the attributes with the parsed values. As another example, a "directory" object may use a pathname as a seed value. The contents, e.g. files and other directories, of a directory having that pathname may be inspected by the agent for creating file objects as contents of the directory object.
Generally, agents come in two flavors, attribute agents and content agents, specified in the "Type" field 328-5 of the "Agents" table 328. An attribute agent is responsible for gathering information about an instance itself, for example, getting the author of a document, the size of the document, and creation date. Attribute agents are normally invoked during instance resolution, which takes place the first time the value of an attribute is requested. In the example, the agent that discovered the length of employment for an employee from an authoritative database is an attribute agent.
Content agents are responsible for gathering the content of the object, for example, getting files in a directory, graphics from a web page, or names from a telephone book. Content agents are invoked whenever content of the object is first accessed, usually when producing a visualization for the object's space. In the example, the agent that discovered files in a directory is a content agent.
Sometimes, information discovered for an object, typically by an attribute agent, causes the object to change its class. For example, an agent for an "employee" object may discover information that the employee is an exempt employee placed, e.g., in an "exempt" attribute of the "employee" object. At step 602, entries in the "Mutations" table 323 are checked to determine whether an attribute has a value that matches a specified condition. In the example, a "Mutations" table 323 entry may contain the attribute identifier in the "Attribute" field 323-2 that matches the attribute identifier of the "exempt" attribute, stored in the "Attribute" field 321-1 of the "Attribute Definitions" table 321.
If the content of the "Value" field 323-4 and the new value, e.g. "true," meet a condition specified in the "Condition" field 323-3, e.g. equality, then the object is reformatted (in step 604) to conform to the class specified in the "Class" field 323-1. In the example, there may be two entries in the Mutation table 323 for the "exempt" attribute, one with a value in "Value" field 323-4 of "true" specifying the "exempt" class and another with a value of "false" specifying the "non-exempt" class.
Another way to determine whether to mutate an object is by executing a mutator agent, identified by a "yes" value in the "Mutator" field 328-1 of subclass agents of the object. Since agents can be written in a procedural language such as Perl, this mechanism affords greater power and flexibility than the "Mutations" table 323. Therefore, by either mechanism, objects can change their class to an immediate subclass; successive mutations allow an object to mutate to more remote subclasses.
Sometimes, the information discovered for an object, typically by a content agent, causes a new object to be instantiated. For example, a content agent for a "directory" object may discover information that a directory contain three files. If an agent discovers information that would appropriate as a seed value for a new object (step 606), then the agent will cause the new object to be instantiated and initialized with the discovered information (step 608). Agents for the new object are automatically invoked when the attributes and contents of the new object are requested, e.g. during visualization.
Sometimes different agents invoked for resolving an instance may return inconsistent information about attributes of the instances. This situation may occur if the data sources are inconsistent or if the seed value does not uniquely specify an object, for example, searching for an employee named "Bob" when "Bob Smith" and "Bob Jones" are employed. There are a variety of approaches to address this situation.
One set of approaches would be to only allow one instance to be resolved. Accordingly, the inconsistent attribute information is ignored, e.g. by using only the new attribute value or only the old attribute value. For example, an HR database as a data source may indicate that an employee's birth date is Dec. 11, 1965, but a Payroll database may indicate that the birth date is Dec. 12, 1965. Thus, one approach would be to use the first value, from the HR database, and another approach would be the second value from the Payroll database. A third approach would be to use the attribute value from the first agent for an "authoritative" data source.
Another approach to the issue of inconsistent attribute values is to allow attributes to contain multiple values, i.e. by additional entries in the Attributes table 311. During visualization, all alternate values would be presented to the user. Still another approach would be to instantiate another object of the same class and initialize the other object with the seed information and the results of the agent.
Yet another approach is a hybrid of the above approaches, by evaluating how well new information obtained from an agent matches an instance being resolved and conditionally overriding the attribute information or creating another instance. For example, the system may compute a "match" ratio of the number of common attributes having the same value (between the attribute values discovered by an agent and an instance being resolved) to the number of common attributes. If the match ratio exceeds a prespecified "match threshold," then the new attribute values would override the inconsistent attribute values. On the other hand, if the match ratio does not exceed the match threshold, then a new object is instantiated using the newly discovered information and the seed values.
At step 610, the server checks whether there are agents remaining to be invoked. Generally, all the class agents and non-local superclass agents for the instance being resolution are invoked in sequence; however, an invoked agent may return a return code indicating that subsequent agents may not be invoked to resolve the instance. For example, an agent may detect that a seed is invalid, e.g. a bad social security number, or that an authoritative database lacks the information, e.g. looking for a country called "Utopia" in a United Nations database. In this situation, the agent returns a "Fail and Quit" return code.
Another situation in which an agent may prevent subsequent agents from being invoked occurs when the agent discovers new information that is authoritative, meaning that it would pointless to look elsewhere. For example, there is no need to look for a country called "United States of America" when the aforementioned authoritative U.N. database indicates that the Unites States is indeed a country. In this situation, the agent returns a "Refresh and Quit" return code. The "Refresh" portion of the return code indicates that a new version of the visualization that takes the new information into account ought to be transmitted to the client browser, e.g. by a server "push" mechanism well-known in the art.
Other return codes, i.e., a "Fail and Continue" return code and a "Refresh and Continue" return code, indicate that the next agent in sequence ought to be invoked. Accordingly, if there is another agent to invoke, execution loops back to step 600. The difference between the "Fail and Continue" return code and the "Refresh and Continue" return code is that the latter return code indications that a new version of the visualization ought to be pushed to the client browser. Consequently, information that is discovered can immediately be visualized, so the user need not wait for all the agents to complete before seeing anything.
By invoking specialized agents associated with each object, knowledge about information discovery is distributed among the objects themselves. Each object, via the agent information discovery mechanism, "knows" how to find more information about itself, i.e. where to look and how to interpret was is found there. As a result, search strategies can be stored and automated for collecting and organizing related information from a diversity of data sources, even when located at different sites in a computer network, e.g. the Internet, or encoded in different, incompatible formats. Thus, the present invention enhances the usefulness and efficiency of information discovery for users who co-ordinate information at work or browse the web at home.
In the process of information discovery, an object of one class may become an object of another class, causing an entire new set of agents to be invoked. For example, an agent for a "company" object might discover that the object is a publicly-owned company with an additional set of agents to search for financial reports. Consequently, an embodiment of the present invention fosters an opportunistic and serendipitous information discovery process.
In the course of information discovery it is possible for the web server to find a large number of content items in response to a query from a user. Accordingly, one embodiment of the present invention performs automatic content classification of an object's content items for visualization. Automatic classification places each item into a particular bin for each of several possible classification criteria. In this manner, the web server automatically performs a "hit analysis" of the query results so that the user can more easily ascertain by browsing to a relevant bin for items that are most relevant to the user.
Referring to FIG. 7, depicted is a flowchart illustrating the operation of automatic content classification. The method of automatic content classification is generic and operates with respect to predefined parameters. In step 700, the number of content items is compared a predefined threshold parameter `N`. The threshold parameter `N` indicates how many content items must be present in order to trigger the automatic content analysis. While the present invention does not contemplate any particular positive value for a predefined threshold `N`, a good value for `N` would be about a screenful of content items when visualized, e.g. around 20 to reduce scrolling. If the number of content items does not exceed the predefined threshold `N`, then all the content items are visualized in a list or a space (step 702).
On the other hand, if the number of content items does exceed the predefined threshold `N`, then the first `M` items, where `M`>`N`, are considered for classification purposes into `R`<=`N" bins (step 704). If all the content items are members of a same class or superclass (e.g., when visualizing the contents of a bin classified by class) (step 706), then execution proceeds to step 708. Since the content items are members of the same (super) class, each attribute of that class is chosen as a criterion if and only if there are at least two instances having a different value for that attribute (step 708). Bins for each criterion are chosen according to the following steps.
If there are less than `R` distinct values for the attribute from among the first `M` content items (step 710), then each distinct attribute value is used as a bin (step 712). On the other hand, if the number of distinct attribute value is greater or equal to the predefined parameter `R`, the values of the attributes are checked, in step 714, to see if they are easily ordered, for example, having a similar format (e.g. all numbers or dates) or being short text strings (e.g. a dozen letters). If the attributes are easily ordered, then, in step 718, the attribute values are partitioned into a series of at most `R` ranges of roughly equal sizes, for determining the bins. For example, this process may yield bins labeled "A-G", "H-N", "O-S", and "T-Z".
If the number of content items exceed the predefined `M` parameters (step 720), then the bins are readjusted in step 722. If the bins designate distinct values (i.e., if step 712 was performed), then and "other" bin is added. If the bins designate ranges, then using open boundaries for the first and last bins, e.g. "<10", "10-20", and ">20", are used (i.e., if step 718) was performed.
At step 714, it may be determined that the attribute values might not be easily ordered, for example because they mix numbers and text or include long strings. Accordingly, the system provides an input field for a search string to match against the attribute (step 716).
If the first `M` items are not all members of the same class, even if members of the same superclass, (step 706), then the classification criterion becomes "By Class" (step 726). In this case, class names of the different classes of the first `M` items are used as bin categories. If there are other, different classes among the items beyond the first `M` items, or if the number of classes exceed `R` (step 728), the system provides an "other" bin for these classes (step 730). Up to `R` bins of the most common classes are designated for use in the visualization (step 732).
At step 734, the system visualizes the instances with the determined bins. Specifically, the user is presented with a list of the bins for that criterion so that the user may navigate to one of the bins for visualization of its contents. Each bin is presented as a hyperlink for ease of activation by a user. When the contents of the selected bin are selected for further visualization, automatic hit analysis is performed again on the bin, by performing steps 700 to 724 as necessary.
Referring to FIG. 8, illustrated are two screen displays 802 and 804 depicting exemplary visualized results of a hit analysis of the content of a modeled bookstore. In response to a query, the server may find a number of objects, belong to one of the following classes: "book," "audio tape," "greeting card," etc. Accordingly, the visualization criterion of "view by class" is used. The objects all are members of a common superclass, "Product", and share the attributes of "price," "promotion," and "description". If at least `M` objects were found, then screen display 802 depicts a possible visualization, using an "other" bin for "view by class" and "view by promotion" criteria. In addition, a "view by price" criterion includes open ranges, i.e., "less than $5" and "more than $30". In contrast, if less than `M` objects were found, then the "other" bin and closed ranges are used, as screen display 804 illustrates. In either case, since the "description" attribute is not easily ordered, a search field is provided.
Since displaying an input field for searching only occurs as a last resort, a user can usually examine the bins and criteria by using ordinary browsing commands (e.g. activating a hyperlink with a mouse) with a reduced need to enter additional input via a keyboard. Automatic content classification thus allows a user to quickly and effectively sift through query results with a large number of "hits."
While this invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5491820 *||Nov 10, 1994||Feb 13, 1996||At&T Corporation||Distributed, intermittently connected, object-oriented database and management system|
|US5548726 *||Dec 17, 1993||Aug 20, 1996||Taligeni, Inc.||System for activating new service in client server network by reconfiguring the multilayer network protocol stack dynamically within the server node|
|US5560005 *||Feb 25, 1994||Sep 24, 1996||Actamed Corp.||Methods and systems for object-based relational distributed databases|
|US5692180 *||Jan 31, 1995||Nov 25, 1997||International Business Machines Corporation||Object-oriented cell directory database for a distributed computing environment|
|US5740549 *||Jun 12, 1995||Apr 14, 1998||Pointcast, Inc.||Information and advertising distribution system and method|
|US5761500 *||Apr 18, 1996||Jun 2, 1998||Mci Communications Corp.||Multi-site data communications network database partitioned by network elements|
|US5761663 *||May 15, 1997||Jun 2, 1998||International Business Machines Corporation||Method for distributed task fulfillment of web browser requests|
|US5809502 *||Aug 9, 1996||Sep 15, 1998||Digital Equipment Corporation||Object-oriented interface for an index|
|US5903725 *||Sep 6, 1996||May 11, 1999||International Business Machines Corporation||Recoverable proxy object in an object oriented environment|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US6073170 *||Nov 14, 1997||Jun 6, 2000||Kabushiki Kaisha Toshiba||Information filtering device and information filtering method|
|US6081815 *||Oct 6, 1997||Jun 27, 2000||Motorola, Inc.||Method for processing a hyperlink formatted message to make it compatible with an alphanumeric messaging device|
|US6175206 *||May 12, 1998||Jan 16, 2001||Kawasaki Jukogyo Kabushiki Kaisha||Robot information processor|
|US6182129 *||Sep 11, 1997||Jan 30, 2001||International Business Machines Corporation||Apparatus, methods and computer program products for managing sessions with host-based application using session vectors|
|US6199081 *||Jun 30, 1998||Mar 6, 2001||Microsoft Corporation||Automatic tagging of documents and exclusion by content|
|US6219670 *||Feb 18, 1998||Apr 17, 2001||International Business Machines Corporation||Method and apparatus for filtering a table list before opening with a graphical user interface|
|US6286047 *||Sep 10, 1998||Sep 4, 2001||Hewlett-Packard Company||Method and system for automatic discovery of network services|
|US6301584 *||Aug 21, 1998||Oct 9, 2001||Home Information Services, Inc.||System and method for retrieving entities and integrating data|
|US6408266 *||Mar 31, 1998||Jun 18, 2002||Yeong Kaung Oon||Didactic and content oriented word processing method with incrementally changed belief system|
|US6424966 *||Jun 30, 1998||Jul 23, 2002||Microsoft Corporation||Synchronizing crawler with notification source|
|US6523028 *||Dec 2, 1999||Feb 18, 2003||Lockhead Martin Corporation||Method and system for universal querying of distributed databases|
|US6529898 *||Jul 22, 1999||Mar 4, 2003||Matthew Shawn Fortner||Method and system for electronically retrieving door hardware data|
|US6567850||Oct 27, 1999||May 20, 2003||Yodlee, Inc.||System and method for determining revenue from an intermediary derived from servicing data requests|
|US6581094 *||Nov 2, 1999||Jun 17, 2003||Sun Microsystems, Inc.||Apparatus and method for identifying a digital device based on the device's uniform device descriptor file that specifies the attributes of the device in a XML document in a networked environment|
|US6668271 *||May 19, 1999||Dec 23, 2003||Richo Company, Ltd.||System for distributing, installing and running web applications (agents)|
|US6694333 *||Dec 5, 2001||Feb 17, 2004||Oldham Associates, L.L.P.||Systems and methods of referencing uniform resource locators|
|US6865728 *||May 13, 1999||Mar 8, 2005||International Business Machines Corporation||Object oriented framework mechanism for discovery of computer systems in a network|
|US6871220||Oct 27, 1999||Mar 22, 2005||Yodlee, Inc.||System and method for distributed storage and retrieval of personal information|
|US6910051 *||Feb 28, 2002||Jun 21, 2005||International Business Machines Corporation||Method and system for mechanism for dynamic extension of attributes in a content management system|
|US6915308 *||Apr 6, 2000||Jul 5, 2005||Claritech Corporation||Method and apparatus for information mining and filtering|
|US6917937 *||Nov 1, 2000||Jul 12, 2005||Sas Institute Inc.||Server-side object filtering|
|US6934694 *||Jun 21, 2001||Aug 23, 2005||Kevin Wade Jamieson||Collection content classifier|
|US6957206||Apr 19, 2001||Oct 18, 2005||Quantum Dynamics, Inc.||Computer system and method with adaptive N-level structures for automated generation of program solutions based on rules input by subject matter experts|
|US6957228 *||Jan 7, 2000||Oct 18, 2005||International Business Machines Corporation||Object oriented apparatus and method for providing context-based class replacement in an object oriented system|
|US6959326 *||Aug 24, 2000||Oct 25, 2005||International Business Machines Corporation||Method, system, and program for gathering indexable metadata on content at a data repository|
|US7024418 *||Jun 23, 2000||Apr 4, 2006||Computer Sciences Corporation||Relevance calculation for a reference system in an insurance claims processing system|
|US7031964||Feb 24, 1999||Apr 18, 2006||Openwave Systems Inc.||Providing a directory of frequently used hyperlinks on a remote server|
|US7039673 *||Dec 24, 1998||May 2, 2006||Computer Associates Think, Inc.||Method and apparatus for dynamic command extensibility in an intelligent agent|
|US7065540||Mar 4, 2002||Jun 20, 2006||Oracle International Corporation||Managing checkpoint queues in a multiple node system|
|US7069514||Dec 3, 2003||Jun 27, 2006||Indx Software Corp.||Modeling system for retrieving and displaying data from multiple sources|
|US7095426||Jun 23, 2000||Aug 22, 2006||Computer Sciences Corporation||Graphical user interface with a hide/show feature for a reference system in an insurance claims processing system|
|US7197455 *||Mar 3, 2000||Mar 27, 2007||Sony Corporation||Content selection system|
|US7200623 *||Mar 4, 2002||Apr 3, 2007||Oracle International Corp.||Methods to perform disk writes in a distributed shared disk system needing consistency across failures|
|US7296039||Oct 12, 2004||Nov 13, 2007||Oracle International Corporation||Managing checkpoint queues in a multiple node system|
|US7328233||Jan 19, 2001||Feb 5, 2008||Corybant, Inc.||Method and apparatus for implementing an active information model|
|US7343307||Jun 23, 2000||Mar 11, 2008||Computer Sciences Corporation||Dynamic help method and system for an insurance claims processing system|
|US7343409 *||Oct 14, 2003||Mar 11, 2008||Sun Microsystems, Inc.||Method, system and article of manufacture for discovering devices in a network monitoring system|
|US7346605 *||Jul 10, 2000||Mar 18, 2008||Markmonitor, Inc.||Method and system for searching and monitoring internet trademark usage|
|US7359863||Sep 29, 2000||Apr 15, 2008||Computer Sciences Corporation||Condition component framework for reinsurance|
|US7366723 *||Oct 5, 2004||Apr 29, 2008||Sap Ag||Visual query modeling for configurable patterns|
|US7389208||Sep 8, 2000||Jun 17, 2008||Accord Solutions, Inc.||System and method for dynamic knowledge construction|
|US7398219||Jun 23, 2000||Jul 8, 2008||Computer Sciences Corporation||System and method for displaying messages using a messages table|
|US7418400||Jun 23, 2000||Aug 26, 2008||Computer Sciences Corporation||Internet-enabled system and method for assessing damages|
|US7430514||Jun 23, 2000||Sep 30, 2008||Computer Sciences Corporation||System and method for processing insurance claims using a table of contents|
|US7430515||Jun 23, 2000||Sep 30, 2008||Computer Sciences Corporation||System and method for externalization of formulas for assessing damages|
|US7451148||Oct 31, 2002||Nov 11, 2008||Computer Sciences Corporation||Method of modifying a business rule while tracking the modifications|
|US7464096||Jun 8, 2005||Dec 9, 2008||Justsystems Evans Reasearch, Inc.||Method and apparatus for information mining and filtering|
|US7478142 *||Sep 29, 1998||Jan 13, 2009||Netscape Communications Corporation||Self-contained applications that are applied to be received by and processed within a browser environment and that have a first package that includes a manifest file and an archive of files including a markup language file and second package|
|US7493403||Mar 13, 2007||Feb 17, 2009||Markmonitor Inc.||Domain name ownership validation|
|US7540021||Sep 14, 2006||May 26, 2009||Justin Page||System and methods for an identity theft protection bot|
|US7548968||Dec 10, 2004||Jun 16, 2009||Markmonitor Inc.||Policing internet domains|
|US7571107||Jun 23, 2000||Aug 4, 2009||Computer Sciences Corporation||System and method for externalization of rules for assessing damages|
|US7577690||Apr 17, 2006||Aug 18, 2009||Oracle International Corporation||Managing checkpoint queues in a multiple node system|
|US7580947||Mar 27, 2003||Aug 25, 2009||Hewlett-Packard Development Company, L.P.||Data representation for improved link analysis|
|US7593909 *||Jun 5, 2003||Sep 22, 2009||Hewlett-Packard Development Company, L.P.||Knowledge representation using reflective links for link analysis applications|
|US7620735||Nov 20, 2003||Nov 17, 2009||Corybant, Inc.||Interactive voice enabled email notification and alert system and method|
|US7636749||Oct 29, 2003||Dec 22, 2009||Ricoh Company, Ltd.||System for distributing, installing and running web applications (agents)|
|US7672879||Oct 27, 2000||Mar 2, 2010||Yodlee.Com, Inc.||Interactive activity interface for managing personal data and performing transactions over a data packet network|
|US7676387||Oct 31, 2002||Mar 9, 2010||Computer Sciences Corporation||Graphical display of business rules|
|US7689442||Oct 31, 2002||Mar 30, 2010||Computer Science Corporation||Method of generating a graphical display of a business rule with a translation|
|US7693731||Sep 29, 2000||Apr 6, 2010||Computer Sciences Corporation||Business process framework for reinsurance|
|US7698277 *||Dec 14, 2000||Apr 13, 2010||Kapow Aps||Query processor, query processor elements and a method of establishing such a query processor and query processor elements and a domain processor|
|US7698341||Jul 8, 2005||Apr 13, 2010||Sas Institute Inc.||Server-side object filtering|
|US7747686 *||Mar 31, 2006||Jun 29, 2010||Yahoo! Inc.||System and method for interacting with data using visual surrogates|
|US7752186||Dec 20, 2004||Jul 6, 2010||Aol Inc.||Grouping multimedia and streaming media search results|
|US7752535||Dec 1, 2005||Jul 6, 2010||Yodlec.com, Inc.||Categorization of summarized information|
|US7756958||Sep 20, 2003||Jul 13, 2010||International Business Machines Corporation||Intelligent discovery of network information from multiple information gathering agents|
|US7765279||Oct 27, 1999||Jul 27, 2010||Verticalone Corporation||System and method for scheduling harvesting of personal information|
|US7856386||Sep 17, 2009||Dec 21, 2010||Yodlee, Inc.||Host exchange in bill paying services|
|US7895064||Sep 2, 2003||Feb 22, 2011||Computer Sciences Corporation||Graphical input display in an insurance processing system|
|US7925967||Jun 8, 2001||Apr 12, 2011||Aol Inc.||Metadata quality improvement|
|US7930278||Feb 20, 2007||Apr 19, 2011||Oracle International Corporation||Methods to perform disk writes in a distributed shared disk system needing consistency across failures|
|US7953767||Oct 5, 2004||May 31, 2011||Sap Ag||Developing applications using configurable patterns|
|US7991630||Jun 6, 2008||Aug 2, 2011||Computer Sciences Corporation||Displaying likelihood values for use in settlement|
|US8000986||Jun 29, 2007||Aug 16, 2011||Computer Sciences Corporation||Claims processing hierarchy for designee|
|US8010389||Jun 29, 2007||Aug 30, 2011||Computer Sciences Corporation||Multiple policy claims processing|
|US8010390||Jun 29, 2007||Aug 30, 2011||Computer Sciences Corporation||Claims processing of information requirements|
|US8010391||Jun 29, 2007||Aug 30, 2011||Computer Sciences Corporation||Claims processing hierarchy for insured|
|US8019851||Apr 21, 2010||Sep 13, 2011||International Business Machines Corporation||Intelligent discovery of network information from multiple information gathering agents|
|US8037126||Mar 12, 2007||Oct 11, 2011||Citrix Systems, Inc.||Systems and methods of dynamically checking freshness of cached objects based on link status|
|US8046732||Dec 30, 2005||Oct 25, 2011||Sap Ag||Distribution of data changes in pattern configurations|
|US8069407||Sep 7, 2000||Nov 29, 2011||Yodlee.Com, Inc.||Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes|
|US8086579||Jan 22, 2002||Dec 27, 2011||Oracle International Corporation||Semantic response to lock requests to reduce coherence overhead in multi-node systems|
|US8095529||Jan 4, 2005||Jan 10, 2012||Aol Inc.||Full-text relevancy ranking|
|US8103783||Mar 12, 2007||Jan 24, 2012||Citrix Systems, Inc.||Systems and methods of providing security and reliability to proxy caches|
|US8126937||Oct 5, 2004||Feb 28, 2012||Sap Ag||Visual database modeling|
|US8169436||Jan 27, 2009||May 1, 2012||Citrix Systems, Inc.||Methods and systems for remoting three dimensional graphics|
|US8190629||Jul 13, 2006||May 29, 2012||Yodlee.Com, Inc.||Network-based bookmark management and web-summary system|
|US8209311||Jul 1, 2010||Jun 26, 2012||Aol Inc.||Methods and systems for grouping uniform resource locators based on masks|
|US8219424||Jun 6, 2008||Jul 10, 2012||Computer Sciences Corporation||Determining amounts for claims settlement using likelihood values|
|US8224977||Nov 6, 2007||Jul 17, 2012||Oracle International Corporation||Using local locks for global synchronization in multi-node systems|
|US8244558||Jun 6, 2008||Aug 14, 2012||Computer Sciences Corporation||Determining recommended settlement amounts by adjusting values derived from matching similar claims|
|US8260771||Jul 22, 2005||Sep 4, 2012||A9.Com, Inc.||Predictive selection of item attributes likely to be useful in refining a search|
|US8260783||Feb 25, 2008||Sep 4, 2012||Siemens Aktiengesellschaft||Storage of multiple, related time-series data streams|
|US8261334||Apr 25, 2008||Sep 4, 2012||Yodlee Inc.||System for performing web authentication of a user by proxy|
|US8275829||Jul 21, 2009||Sep 25, 2012||Citrix Systems, Inc.||Systems and methods of prefetching objects for caching using QoS|
|US8343196||Feb 24, 2006||Jan 1, 2013||Synthes Usa, Llc||Bone plate|
|US8350863||Jan 27, 2009||Jan 8, 2013||Citrix Systems, Inc.||Methods and systems for improving resource utilization by delaying rendering of three dimensional graphics|
|US8356036 *||Feb 19, 2008||Jan 15, 2013||Accenture Global Services||Knowledge discovery tool extraction and integration|
|US8364785||Dec 9, 2009||Jan 29, 2013||Citrix Systems, Inc.||Systems and methods for domain name resolution interception caching|
|US8405654||Apr 30, 2012||Mar 26, 2013||Citrix Systems, Inc.||Methods and systems for remoting three dimensional graphics|
|US8442938||Jan 14, 2005||May 14, 2013||Siemens Aktiengesellschaft||Child data structure update in data management system|
|US8498944||Sep 15, 2004||Jul 30, 2013||Travelport Operations, Inc.||Interactive computer-implemented system and method for negotiating sale of goods and/or services|
|US8504775||Mar 12, 2007||Aug 6, 2013||Citrix Systems, Inc||Systems and methods of prefreshening cached objects based on user's current web page|
|US8510334||Nov 5, 2009||Aug 13, 2013||Oracle International Corporation||Lock manager on disk|
|US8521079||Dec 21, 2007||Aug 27, 2013||Ibiquity Digital Corporation||Radio service registry|
|US8555359||Feb 26, 2009||Oct 8, 2013||Yodlee, Inc.||System and methods for automatically accessing a web site on behalf of a client|
|US8574268||Jan 9, 2008||Nov 5, 2013||DePuy Synthes Product, LLC||Highly-versatile variable-angle bone plate system|
|US8595475||Feb 17, 2012||Nov 26, 2013||AOL, Inc.||Method of disseminating advertisements using an embedded media player page|
|US8615583||Jul 13, 2010||Dec 24, 2013||Citrix Systems, Inc.||Systems and methods of revalidating cached objects in parallel with request for object|
|US8620970 *||Oct 3, 2006||Dec 31, 2013||Network Appliance, Inc.||Methods and apparatus for changing versions of a filesystem|
|US8661111||Oct 25, 2000||Feb 25, 2014||The Nielsen Company (Us), Llc||System and method for estimating prevalence of digital content on the world-wide-web|
|US8665265||Mar 18, 2013||Mar 4, 2014||Citrix Systems, Inc.||Methods and systems for remoting three dimensional graphics|
|US8676695||Sep 16, 2011||Mar 18, 2014||Cortege Wireless, Llc||User interface, system and method for performing a web-based transaction|
|US8700590||Jun 20, 2012||Apr 15, 2014||Microsoft Corporation||Grouping multimedia and streaming media search results|
|US8700671||Aug 15, 2005||Apr 15, 2014||Siemens Aktiengesellschaft||System and methods for dynamic generation of point / tag configurations|
|US8701010||Mar 12, 2007||Apr 15, 2014||Citrix Systems, Inc.||Systems and methods of using the refresh button to determine freshness policy|
|US8758346||Sep 14, 2010||Jun 24, 2014||DePuy Synthes Products, LLC||Variable angle compression plate|
|US8775499||Jun 3, 2011||Jul 8, 2014||International Business Machines Corporation||Intelligent discovery of network information from multiple information gathering agents|
|US8819404||Oct 9, 2013||Aug 26, 2014||Aol Inc.||Method of disseminating advertisements using an embedded media player page|
|US8819793||Sep 20, 2011||Aug 26, 2014||Csidentity Corporation||Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository|
|US8845698||Dec 13, 2012||Sep 30, 2014||DePuy Synthes Products, LLC||Bone plate|
|US8852245||Mar 12, 2013||Oct 7, 2014||DePuy Synthes Products, LLC||Bone plate|
|US8876873||Mar 12, 2013||Nov 4, 2014||DePuy Synthes Products, LLC||Bone plate|
|US8892495||Jan 8, 2013||Nov 18, 2014||Blanding Hovenweep, Llc||Adaptive pattern recognition based controller apparatus and method and human-interface therefore|
|US8918812||Oct 24, 2001||Dec 23, 2014||Aol Inc.||Method of sizing an embedded media player page|
|US8930402||Oct 31, 2005||Jan 6, 2015||Verizon Patent And Licensing Inc.||Systems and methods for automatic collection of data over a network|
|US9009290||Jan 22, 2004||Apr 14, 2015||Sony Corporation||Methods and apparatuses for discovery and notification of services|
|US9168075||Nov 18, 2009||Oct 27, 2015||DePuy Synthes Products, Inc.||Variable angle locked bone fixation system|
|US9235728||Feb 16, 2012||Jan 12, 2016||Csidentity Corporation||System and methods for identifying compromised personally identifiable information on the internet|
|US9237152||Jun 14, 2014||Jan 12, 2016||Csidentity Corporation||Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository|
|US9269096 *||May 23, 2011||Feb 23, 2016||Microsoft Technology Licensing, Llc||Advertisement rendering for multiple synced devices|
|US9295505||Oct 3, 2014||Mar 29, 2016||DePuy Synthes Products, Inc.||Bone plate|
|US9314284||Oct 17, 2013||Apr 19, 2016||DePuy Synthes Products, Inc.||Highly-versatile variable-angle bone plate system|
|US9407700||Jun 17, 2014||Aug 2, 2016||International Business Machines Corporation||Intelligent discovery of network information from multiple information gathering agents|
|US9412117||Jul 24, 2015||Aug 9, 2016||Buymetrics, Inc.||Automated system for adapting market data and evaluating the market value of items|
|US9418371||Jun 16, 2015||Aug 16, 2016||Buymetrics, Inc.||Automated system for adapting market data and evaluating the market value of items|
|US9454775||Dec 4, 2014||Sep 27, 2016||Aol Inc.||Systems and methods for rendering content|
|US9514479||Jan 6, 2014||Dec 6, 2016||The Nielsen Company (Us), Llc||System and method for estimating prevalence of digital content on the world-wide-web|
|US9524495||Aug 15, 2016||Dec 20, 2016||Buymetrics, Inc.||Automated system for adapting market data and evaluating the market value of items|
|US9535563||Nov 12, 2013||Jan 3, 2017||Blanding Hovenweep, Llc||Internet appliance system and method|
|US9542689||Aug 8, 2016||Jan 10, 2017||Buymetrics, Inc.||Automated system for adapting market data and evaluating the market value of items|
|US9558368||Nov 2, 2015||Jan 31, 2017||Csidentity Corporation||System and methods for identifying compromised personally identifiable information on the internet|
|US9576296||Sep 6, 2016||Feb 21, 2017||Buymetrics, Inc.||Automated system for adapting market data and evaluating performance in transactions|
|US9595050||Jul 3, 2014||Mar 14, 2017||Aol Inc.||Method of disseminating advertisements using an embedded media player page|
|US9633112 *||Jul 19, 2013||Apr 25, 2017||Kapow Software||Method of retrieving attributes from at least two data sources|
|US9633356||Jul 20, 2006||Apr 25, 2017||Aol Inc.||Targeted advertising for playlists based upon search queries|
|US20010029523 *||Jan 22, 2001||Oct 11, 2001||Mcternan Brennan J.||System and method for accounting for variations in client capabilities in the distribution of a media presentation|
|US20010047401 *||Jan 22, 2001||Nov 29, 2001||Mcternan Brennan J.||System and method for managing connections to servers delivering multimedia content|
|US20010047422 *||Jan 22, 2001||Nov 29, 2001||Mcternan Brennan J.||System and method for using benchmarking to account for variations in client capabilities in the distribution of a media presentation|
|US20020035593 *||Jan 19, 2001||Mar 21, 2002||Salim Mohammad S.||Method and apparatus for implementing an active information model|
|US20020056120 *||Jan 22, 2001||May 9, 2002||Mcternan Brennan J.||Method and system for distributing video using a virtual set|
|US20020095403 *||Mar 4, 2002||Jul 18, 2002||Sashikanth Chandrasekaran||Methods to perform disk writes in a distributed shared disk system needing consistency across failures|
|US20020103920 *||Jun 8, 2001||Aug 1, 2002||Berkun Ken Alan||Interpretive stream metadata extraction|
|US20020138503 *||Feb 28, 2002||Sep 26, 2002||Rainer Buesing||Method and system for mechanism for dynamic extension of attributes in a content management system|
|US20020169872 *||May 14, 2001||Nov 14, 2002||Hiroshi Nomiyama||Method for arranging information, information processing apparatus, storage media and program tranmission apparatus|
|US20020198855 *||Jun 21, 2001||Dec 26, 2002||Jameson Kevin Wade||Collection content classifier|
|US20030105774 *||Dec 5, 2001||Jun 5, 2003||Oldham Associates, L.L.C||Systems and Methods of referencing uniform resource locators|
|US20040030685 *||Dec 14, 2000||Feb 12, 2004||Morten Helles||Query processor, query processor elements and a method of establishing such a query processor and query processor elements and a domain processor|
|US20040117393 *||Dec 3, 2003||Jun 17, 2004||Demesa Jesse G||Modeling system for retrieving and displaying data from multiple sources|
|US20040181606 *||Feb 3, 2004||Sep 16, 2004||Jens Astor||Method for controlling an exchange|
|US20040193514 *||Mar 27, 2003||Sep 30, 2004||Kasra Kasravi||Data representation for improved link analysis|
|US20040249829 *||Jun 5, 2003||Dec 9, 2004||Kasra Kasravi||Knowledge representation using reflective links for link analysis applications|
|US20040268395 *||Jan 30, 2004||Dec 30, 2004||Samsung Electronics Co., Ltd.||Electronic program magazine|
|US20050033660 *||Sep 15, 2004||Feb 10, 2005||Netmarket Group Inc.||Interactive computer-implemented system and method for negotiating sale of goods and/or services|
|US20050065907 *||Oct 12, 2004||Mar 24, 2005||Oracle Corporation||Managing checkpoint queues in a multiple node system|
|US20050083854 *||Sep 20, 2003||Apr 21, 2005||International Business Machines Corporation||Intelligent discovery of network information from multiple information gathering agents|
|US20050089019 *||Nov 20, 2003||Apr 28, 2005||Mohammad Salim||Interactive voice enabled email notification and alert system and method|
|US20050165400 *||Jan 26, 2004||Jul 28, 2005||Fernandez Alberto A.||Variable angle locked bone fixation system|
|US20050182825 *||Jan 22, 2004||Aug 18, 2005||Edward Eytchison||Methods and apparatuses for discovery and notification of services|
|US20060020586 *||Jul 12, 2005||Jan 26, 2006||Michel Prompt||System and method for providing access to databases via directories and other hierarchical structures and interfaces|
|US20060064457 *||Oct 29, 2003||Mar 23, 2006||Ricoh Corporation||System for distributing, installing and running web applications (agents)|
|US20060067334 *||Aug 15, 2005||Mar 30, 2006||Ougarov Andrei V||System and methods for dynamic generation of point / tag configurations|
|US20060074942 *||Oct 5, 2004||Apr 6, 2006||Shaburov Victor V||Visual database modeling|
|US20060074967 *||Oct 5, 2004||Apr 6, 2006||Shaburov Victor V||Visual query modeling for configurable patterns|
|US20060075382 *||Oct 5, 2004||Apr 6, 2006||Shaburov Victor V||Developing applications using configurable patterns|
|US20060106590 *||May 16, 2003||May 18, 2006||Agency For Science, Technology And Research||Computing services discovery system and method therefor|
|US20060161597 *||Jan 14, 2005||Jul 20, 2006||Ougarov Andrei V||Child data structure update in data management system|
|US20060165638 *||Nov 17, 2003||Jul 27, 2006||Basf Aktiengesellschaft||Compositions comprising at least one copolymer (a) and at least one copolymer (b) and use thereof in cosmetic preparations|
|US20060173873 *||Jan 9, 2006||Aug 3, 2006||Michel Prompt||System and method for providing access to databases via directories and other hierarchical structures and interfaces|
|US20060195648 *||Apr 17, 2006||Aug 31, 2006||Oracle International Corporation||Managing checkpoint queues in a multiple node system|
|US20060200741 *||May 1, 2006||Sep 7, 2006||Demesa Jesse G||Modeling system for retrieving and displaying data from multiple sources|
|US20070124270 *||Sep 14, 2006||May 31, 2007||Justin Page||System and methods for an identity theft protection bot|
|US20070233814 *||Mar 31, 2006||Oct 4, 2007||Yahoo!, Inc.||System and method for interacting with data using visual surrogates|
|US20080082589 *||Oct 3, 2006||Apr 3, 2008||Network Appliance, Inc.||Methods and apparatus for changing versions of a filesystem|
|US20080147590 *||Feb 19, 2008||Jun 19, 2008||Accenture Global Services Gmbh||Knowledge discovery tool extraction and integration|
|US20080208890 *||Feb 25, 2008||Aug 28, 2008||Christopher Patrick Milam||Storage of multiple, related time-series data streams|
|US20090018984 *||Jun 16, 2008||Jan 15, 2009||Solinsky James C||System and method for dynamic knowledge construction|
|US20100056043 *||Dec 21, 2007||Mar 4, 2010||Ibiquity Digital Corporation||Radio Service Registry|
|US20100205299 *||Apr 21, 2010||Aug 12, 2010||International Business Machines Corporation||Intelligent Discovery Of Network Information From Multiple Information Gathering Agents|
|US20110029822 *||Aug 3, 2009||Feb 3, 2011||Sap Ag||Tracking of java objects during request processing|
|US20110119268 *||Nov 13, 2009||May 19, 2011||Rajaram Shyam Sundar||Method and system for segmenting query urls|
|US20110173169 *||Mar 23, 2011||Jul 14, 2011||Oracle International Corporation||Methods To Perform Disk Writes In A Distributed Shared Disk System Needing Consistency Across Failures|
|US20110238728 *||Jun 3, 2011||Sep 29, 2011||International Business Machines Corporation||Intelligent Discovery Of Network Information From Multiple Information Gathering Agents|
|US20120303442 *||May 23, 2011||Nov 29, 2012||Microsoft Corporation||Advertisement rendering for multiple synced devices|
|US20140040223 *||Jul 19, 2013||Feb 6, 2014||Kapow Aps||Method of retrieving attributes from at least two data sources|
|EP1269334A1 *||Feb 2, 2001||Jan 2, 2003||Becomm Corporation||Media routing|
|EP1269334A4 *||Feb 2, 2001||Aug 29, 2007||Becomm Corp||Media routing|
|WO2000039695A1 *||Dec 22, 1999||Jul 6, 2000||Computer Associates Think, Inc.||Method and apparatus for dynamic command extensibility in an intelligent agent|
|WO2000077967A2 *||Jun 14, 2000||Dec 21, 2000||Nextpage, Inc.||Intelligently augmentable web proxy server with per-user customization capability|
|WO2000077967A3 *||Jun 14, 2000||May 3, 2001||Portola Group Inc||Intelligently augmentable web proxy server with per-user customization capability|
|WO2001052462A3 *||Oct 25, 2000||Jan 31, 2002||Jupiter Media Metrix Inc||System and method for estimating prevalence of digital content on the world-wide-web|
|WO2001053962A1 *||Jan 22, 2001||Jul 26, 2001||Sorceron, Inc.||System and method for delivering rich media content over a network|
|WO2001057695A1||Feb 2, 2001||Aug 9, 2001||Becomm Corporation||Media routing|
|WO2001075664A1 *||Mar 31, 2000||Oct 11, 2001||Kapow Aps||Method of retrieving attributes from at least two data sources|
|WO2002019222A1 *||Aug 31, 2001||Mar 7, 2002||Clinnet Solutions Llc||Health-related information distribution system|
|WO2002035323A2 *||Oct 26, 2001||May 2, 2002||Charles Petruzzi||Device, system and method for a rotating search engine|
|WO2002035323A3 *||Oct 26, 2001||Aug 29, 2002||Charles Petruzzi||Device, system and method for a rotating search engine|
|WO2002077844A2 *||Mar 22, 2002||Oct 3, 2002||Yodlee.Com, Inc.||Turnkey system providing centralized data aggregation|
|WO2002077844A3 *||Mar 22, 2002||Nov 14, 2002||Yodlee Inc||Turnkey system providing centralized data aggregation|
|WO2004088546A2 *||Mar 25, 2004||Oct 14, 2004||Electronic Data Systems Corporation||Data representation for improved link analysis|
|WO2004088546A3 *||Mar 25, 2004||Dec 27, 2007||Electronic Data Syst Corp||Data representation for improved link analysis|
|U.S. Classification||1/1, 707/999.103, 707/999.104|
|Cooperative Classification||Y10S707/99944, Y10S707/99945, G06F17/30607|
|Aug 21, 1997||AS||Assignment|
Owner name: HOME INFORMATION SERVICES, INC., NEW YORK
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RANGER, DENIS;REEL/FRAME:008681/0084
Effective date: 19970815
|Jun 26, 2003||REMI||Maintenance fee reminder mailed|
|Dec 2, 2003||SULP||Surcharge for late payment|
|Dec 2, 2003||FPAY||Fee payment|
Year of fee payment: 4
|Sep 17, 2004||AS||Assignment|
Owner name: MORGAN SIGNALS LLC, CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HOME INFORMATION SERVICES;REEL/FRAME:015139/0393
Effective date: 20040709
|Jul 17, 2007||SULP||Surcharge for late payment|
Year of fee payment: 7
|Jul 17, 2007||FPAY||Fee payment|
Year of fee payment: 8
|May 23, 2011||FPAY||Fee payment|
Year of fee payment: 12
|Dec 6, 2015||AS||Assignment|
Owner name: ZARBANA DIGITAL FUND LLC, DELAWARE
Free format text: MERGER;ASSIGNOR:MORGAN SIGNALS LLC;REEL/FRAME:037219/0354
Effective date: 20150811